Movatterモバイル変換


[0]ホーム

URL:


US20220239483A1 - Long-lasting refresh tokens in self-contained format - Google Patents

Long-lasting refresh tokens in self-contained format
Download PDF

Info

Publication number
US20220239483A1
US20220239483A1US17/158,533US202117158533AUS2022239483A1US 20220239483 A1US20220239483 A1US 20220239483A1US 202117158533 AUS202117158533 AUS 202117158533AUS 2022239483 A1US2022239483 A1US 2022239483A1
Authority
US
United States
Prior art keywords
token
refresh
refresh token
client
protected version
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US17/158,533
Other versions
US11546159B2 (en
Inventor
Radoslav Ivanov Sugarev
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SAP SE
Original Assignee
SAP SE
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SAP SEfiledCriticalSAP SE
Priority to US17/158,533priorityCriticalpatent/US11546159B2/en
Assigned to SAP SEreassignmentSAP SEASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: SUGAREV, RADOSLAV IVANOV
Publication of US20220239483A1publicationCriticalpatent/US20220239483A1/en
Priority to US18/148,935prioritypatent/US12113903B2/en
Application grantedgrantedCritical
Publication of US11546159B2publicationCriticalpatent/US11546159B2/en
Activelegal-statusCriticalCurrent
Adjusted expirationlegal-statusCritical

Links

Images

Classifications

Definitions

Landscapes

Abstract

The present disclosure relates to computer-implemented methods, software, and systems for securely generating a new access token based on relatively long-lasting refresh tokens in self-contained format. A first request to generate a new access token for authorization of a client application with an application server is received and includes a first protected version of a refresh token. The first protected version of the refresh token is an encrypted version of the refresh token based on a first client identifier. The first protected version of the refresh token is decrypted to determine content of the refresh token based on a second client identifier of the client application that is externally invoked for validating the authorization. In response to successfully decrypting the first protected version, performing a validation of the refresh token. In response to successfully validating the refresh token, generating the new access token and providing it to the client application.

Description

Claims (20)

What is claimed is:
1. A computer-implemented method executed at an authorization server, the method comprising:
receiving, from a client application, a first request to generate a new access token for authorization of the client application with an application server, wherein the first request includes a first protected version of a refresh token to authenticate with the authorization server for generating the new access token, wherein the first protected version of the refresh token is an encrypted version of the refresh token based on a first client identifier, and wherein the refresh token is a self-contained token that is readable by the authorization server;
decrypting the first protected version of the refresh token to determine content of the refresh token, wherein the decrypting of the first protected version is based on a second client identifier of the client application that is externally invoked for validating the authorization;
in response to successfully decrypting the first protected version of the refresh token, performing a validation of the refresh token to determine whether to authorize a generation of the new access token for the client application; and
in response to successfully validating the refresh token:
generating the new access token; and
providing the new access token to the client application.
2. The method ofclaim 1, wherein the first protected version of the refresh token is generated by the client application based on the first client identifier of the client application and the refresh token.
3. The method ofclaim 2, wherein the first client identifier and the second client identifier are identical.
4. The method ofclaim 1, further comprising obtaining, from a key management tool, the second client identifier of the client application as a current client identifier for decrypting protected refresh tokens received with requests for generation of access tokens.
5. The method ofclaim 1, wherein the first protected version of the refresh token is generated by encrypting the refresh token with the first client identifier, wherein the first protected version of the refresh token is decrypted based on the second client identifier, and wherein the first client identifier and the second client identifier are symmetric keys generated for secure protection of exchanged information associated with the client application.
6. The method ofclaim 1, wherein a signature is generated for the refresh token based on the first client identifier and is sent together with the protected version of the refresh token to the authorization server.
7. The method ofclaim 6, wherein decrypting the first protected version of the refresh token comprises:
validating the signature of the first protected version of the refresh token, wherein the signature is validated based on the second client identifier.
8. The method ofclaim 1, wherein the first protected version of the refresh token that is received as part of the first request to generate the access token includes the refresh token and a message authentication code, wherein the message authentication code is computed based on at least a portion of the refresh token and the first client identifier.
9. The method ofclaim 1, wherein successfully decrypting the first protected version of the refresh token to determine the content of the refresh token further comprises:
decrypting the first protected version of the refresh token based on the second client identifier of the client application; and
in response to successfully decrypting the first protected version of the refresh token with the second client identifier, validating the refresh token as a valid token for requesting the new access token.
10. The method ofclaim 1, wherein the refresh token is a string representing an authorization granted and is associated with a first validity period, wherein the new access token is associated with a second validity period, and wherein the first validity period is longer than the second validity period.
11. The method ofclaim 1, wherein the refresh token is generated by the authorization server, and wherein the refresh token is associated with the client application and the application server.
12. The method ofclaim 1, further comprising:
receiving a subsequent request to generate a second new access token, wherein the subsequent request includes a second protected version of the refresh token, wherein the second protected version is a second encrypted version of the refresh token, wherein the refresh token is encrypted with a new client identifier different from the first client identifier to generate the second protected version of the refresh token; and
replacing the second client identifier with a third client identifier that decryptes the second protected version of the refresh token, wherein the second and the third client identifier are persisted at a key store where a single version of a client identifier for the client application is maintained at any point in time.
13. A non-transitory, computer-readable medium coupled to one or more processors and having instructions stored thereon which, when executed by the one or more processors, cause the one or more processors to perform operations, the operations comprising:
receiving, from a client application, a first request to generate a new access token for authorization of the client application with an application server, wherein the first request includes a first protected version of a refresh token to authenticate with the authorization server for generating the new access token, wherein the first protected version of the refresh token is an encrypted version of the refresh token based on a first client identifier, and wherein the refresh token is a self-contained token that is readable by the authorization server;
decrypting the first protected version of the refresh token to determine content of the refresh token, wherein the decrypting of the first protected version is based on a second client identifier of the client application that is externally invoked for validating the authorization;
in response to successfully decrypting the first protected version of the refresh token, performing a validation of the refresh token to determine whether to authorize a generation of the new access token for the client application; and
in response to successfully validating the refresh token:
generating the new access token; and
providing the new access token to the client application.
14. The computer-readable medium ofclaim 13, wherein the first protected version of the refresh token is generated by the client application based on the first client identifier of the client application and the refresh token.
15. The computer-readable medium ofclaim 13, further comprising instructions which, when executed by the one or more processors, cause the one or more processors to perform operations comprising obtaining, from a key management tool, the second client identifier of the client application as a current client identifier for decrypting protected refresh tokens received with requests for generation of access tokens, wherein the first protected version of the refresh token is generated by encrypting the refresh token with the first client identifier, wherein the first protected version of the refresh token is decrypted based on the second client identifier, and wherein the first client identifier and the second client identifier are symmetric keys generated for secure protection of exchanged information associated with the client application.
16. The computer-readable medium ofclaim 13, wherein a signature is generated for the refresh token based on the first client identifier and is sent together with the protected version of the refresh token to the authorization server, and wherein the instructions to decrypt the first protected version of the refresh token further comprise instructions, which when executed by the one or more processors, cause the one or more processors to perform operations comprising:
validating the signature of the first protected version of the refresh token, wherein the signature is validated based on the second client identifier.
17. The computer-readable medium ofclaim 13, wherein successfully decrypting the first protected version of the refresh token to determine the content of the refresh token further comprises instructions which when executed by the one or more processors, cause the one or more processors to perform operations comprising:
decrypting the first protected version of the refresh token based on the second client identifier of the client application; and
in response to successfully decrypting the first protected version of the refresh token with the second client identifier, validating the refresh token as a valid token for requesting the new access token.
18. A system comprising
a computing device; and
a computer-readable storage device coupled to the computing device and having instructions stored thereon which, when executed by the computing device, cause the computing device to perform operations, the operations comprising:
receiving, from a client application, a first request to generate a new access token for authorization of the client application with an application server, wherein the first request includes a first protected version of a refresh token to authenticate with the authorization server for generating the new access token, wherein the first protected version of the refresh token is an encrypted version of the refresh token based on a first client identifier, and wherein the refresh token is a self-contained token that is readable by the authorization server;
decrypting the first protected version of the refresh token to determine content of the refresh token, wherein the decrypting of the first protected version is based on a second client identifier of the client application that is externally invoked for validating the authorization;
in response to successfully decrypting the first protected version of the refresh token, performing a validation of the refresh token to determine whether to authorize a generation of the new access token for the client application; and
in response to successfully validating the refresh token:
generating the new access token; and
providing the new access token to the client application.
19. The system ofclaim 18, wherein the first protected version of the refresh token is generated by the client application based on the first client identifier of the client application and the refresh token, and wherein the computer-readable storage device further comprise instructions which, when executed by the one or more processors, cause the one or more processors to perform operations comprising obtaining, from a key management tool, the second client identifier of the client application as a current client identifier for decrypting protected refresh tokens received with requests for generation of access tokens, wherein the first protected version of the refresh token is generated by encrypting the refresh token with the first client identifier, wherein the first protected version of the refresh token is decrypted based on the second client identifier, and wherein the first client identifier and the second client identifier are symmetric keys generated for secure protection of exchanged information associated with the client application.
20. The system ofclaim 18, wherein successfully decrypting the first protected version of the refresh token to determine the content of the refresh token further comprises instructions which when executed by the one or more processors, cause the one or more processors to perform operations comprising:
decrypting the first protected version of the refresh token based on the second client identifier of the client application; and
in response to successfully decrypting the first protected version of the refresh token with the second client identifier, validating the refresh token as a valid token for requesting the new access token.
US17/158,5332021-01-262021-01-26Long-lasting refresh tokens in self-contained formatActive2041-07-11US11546159B2 (en)

Priority Applications (2)

Application NumberPriority DateFiling DateTitle
US17/158,533US11546159B2 (en)2021-01-262021-01-26Long-lasting refresh tokens in self-contained format
US18/148,935US12113903B2 (en)2021-01-262022-12-30Long-lasting refresh tokens in self-contained format

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
US17/158,533US11546159B2 (en)2021-01-262021-01-26Long-lasting refresh tokens in self-contained format

Related Child Applications (1)

Application NumberTitlePriority DateFiling Date
US18/148,935ContinuationUS12113903B2 (en)2021-01-262022-12-30Long-lasting refresh tokens in self-contained format

Publications (2)

Publication NumberPublication Date
US20220239483A1true US20220239483A1 (en)2022-07-28
US11546159B2 US11546159B2 (en)2023-01-03

Family

ID=82495086

Family Applications (2)

Application NumberTitlePriority DateFiling Date
US17/158,533Active2041-07-11US11546159B2 (en)2021-01-262021-01-26Long-lasting refresh tokens in self-contained format
US18/148,935ActiveUS12113903B2 (en)2021-01-262022-12-30Long-lasting refresh tokens in self-contained format

Family Applications After (1)

Application NumberTitlePriority DateFiling Date
US18/148,935ActiveUS12113903B2 (en)2021-01-262022-12-30Long-lasting refresh tokens in self-contained format

Country Status (1)

CountryLink
US (2)US11546159B2 (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20210350021A1 (en)*2019-10-212021-11-11Google LlcVerifiable consent for privacy protection
CN115426156A (en)*2022-08-302022-12-02北京商银微芯科技有限公司Method and device for processing multiple concurrent asynchronous characteristic network requests
US20230075552A1 (en)*2021-09-032023-03-09Mastercard International IncorporatedSystems and methods for use in data coupling among data structures
US20230109109A1 (en)*2021-09-302023-04-06Oracle International CorporationApplications as resource principals or service principals
US20230126588A1 (en)*2020-03-252023-04-27Schlumberger Technology CorporationIntegrated authentication system and method
CN116566600A (en)*2023-04-262023-08-08湖南快乐阳光互动娱乐传媒有限公司 Software audit status push method and device, storage medium and electronic equipment
US12069185B1 (en)*2021-10-142024-08-20Blackrock, Inc.Systems and methods for a data integration connector
US20240291659A1 (en)*2023-02-242024-08-29Authenticating. Com, LLCTokenized Credential Verification System
US12113903B2 (en)2021-01-262024-10-08Sap SeLong-lasting refresh tokens in self-contained format
WO2025017027A1 (en)*2023-07-192025-01-23Koninklijke Kpn N.V.Authentication and device identifier management for passive wireless transmission devices
US12210597B1 (en)*2024-05-082025-01-28Anonyome Labs, Inc.Apparatus and method for cross-domain digital verifiable credential exchange
CN119906707A (en)*2025-04-022025-04-29奥特酷智能科技(南京)有限公司 A line brushing service method and server based on SOVD protocol
CN120415911A (en)*2025-07-022025-08-01歌尔股份有限公司 Data usage rights management method, device and electronic device

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US11757645B2 (en)2021-01-262023-09-12Sap SeSingle-use authorization codes in self-contained format

Citations (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9819672B1 (en)*2015-06-262017-11-14EMC IP Holding Company LLCSharing access tokens with trusted users
US10469484B1 (en)*2015-01-272019-11-05Google LlcAutomatic discovery and retrieval of interoperable applications
US10887301B1 (en)*2017-12-122021-01-05United Services Automobile Association (Usaa)Client registration for authorization
US20210288808A1 (en)*2020-03-132021-09-16Ebay Inc.Secure token refresh
US11349662B2 (en)*2019-10-292022-05-31Synchrony BankPersistent login
US20220232003A1 (en)*2021-01-202022-07-21International Business Machines CorporationLimiting scopes in token-based authorization systems

Family Cites Families (38)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6959393B2 (en)2002-04-302005-10-25Threat Guard, Inc.System and method for secure message-oriented network communications
ATE426966T1 (en)2006-05-262009-04-15Sap Ag METHOD AND DEVICE FOR SECURE PROCESSING OF A COMMAND BY A MOBILE AGENT IN A NETWORK.
US8145195B2 (en)*2008-04-142012-03-27Nokia CorporationMobility related control signalling authentication in mobile communications system
US8019860B2 (en)2008-12-222011-09-13Sap AgService accounting method and apparatus for composite service
US8650622B2 (en)*2011-07-012014-02-11Telefonaktiebolaget Lm Ericsson (Publ)Methods and arrangements for authorizing and authentication interworking
US8959347B2 (en)*2011-08-292015-02-17Salesforce.Com, Inc.Methods and systems of data security in browser storage
US9043886B2 (en)2011-09-292015-05-26Oracle International CorporationRelying party platform/framework for access management infrastructures
US9256413B2 (en)2012-04-172016-02-09Sap SeAutomatic identification of services
US8700899B1 (en)2012-06-272014-04-15Emc CorporationForward-secure key unlocking for cryptographic devices
WO2014095850A1 (en)2012-12-192014-06-26Deutsche Telekom AgMethod and system for terminal device-based communication between third-party applications and an electronic wallet
US9197408B2 (en)2013-05-102015-11-24Sap SeSystems and methods for providing a secure data exchange
US9344410B1 (en)2014-10-312016-05-17Sap SeTelecommunication method for securely exchanging data
US9900212B2 (en)2014-11-032018-02-20Sap SeInstallation of an arbitrary server as an extension of a computing platform
US9813400B2 (en)2014-11-072017-11-07Probaris Technologies, Inc.Computer-implemented systems and methods of device based, internet-centric, authentication
US20160179494A1 (en)2014-12-182016-06-23Vladimir PavlovIntegration of an arbitrary server installed as an extension of a computing platform
US20170085563A1 (en)*2015-09-182017-03-23First Data CorporationSystem for validating a biometric input
US9800580B2 (en)2015-11-162017-10-24Mastercard International IncorporatedSystems and methods for authenticating an online user using a secure authorization server
JP6491796B2 (en)2016-05-112019-03-27オラクル・インターナショナル・コーポレイション Multi-tenant identity and data security management cloud service
US10469478B2 (en)2016-12-072019-11-05Vmware, Inc.Inter-application secure data sharing workflow
US10205709B2 (en)2016-12-142019-02-12Visa International Service AssociationKey pair infrastructure for secure messaging
EP3422630B1 (en)2017-06-272021-02-17Nokia Technologies OyAccess control to a network device from a user device
AU2018336919A1 (en)2017-09-212020-05-07The Authoriti Network, Inc.System and method for authorization token generation and transaction validation
US11569998B2 (en)*2018-01-252023-01-31Visa International Service AssociationToken offline provisioning
US10963553B2 (en)2018-02-152021-03-30Nokia Technologies OySecurity management for service authorization in communication systems with service-based architecture
US10931656B2 (en)2018-03-272021-02-23Oracle International CorporationCross-region trust for a multi-tenant identity cloud service
US11108762B2 (en)*2018-06-052021-08-31The Toronto-Dominion BankMethods and systems for controlling access to a protected resource
US11303449B2 (en)2018-06-222022-04-12Salesforce.Com, Inc.User device validation at an application server
US10834074B2 (en)2018-08-172020-11-10International Business Machines CorporationPhishing attack prevention for OAuth applications
US11184173B2 (en)2018-08-242021-11-23Powch, LLCSecure distributed information system
JP7212169B2 (en)2019-10-112023-01-24エスダブリュー エンパイア カンパニー リミテッド SIMPLE AUTHENTICATION METHOD AND SYSTEM USING BROWSER WEB STORAGE
CN111131301A (en)2019-12-312020-05-08江苏徐工信息技术股份有限公司Unified authentication and authorization scheme
US11443380B2 (en)2020-02-202022-09-13Mark CummingsSystem and method of providing and recording personalized context-specific advice in the form of an artificial intelligence view of a hierarchical portfolio
US11431502B2 (en)2020-09-182022-08-30Citrix Systems, Inc.Enhanced token transfer
US20220138306A1 (en)2020-11-052022-05-05Adobe Inc.Offline multi-factor one-time password authentication
US11563580B2 (en)2020-11-122023-01-24Sap SeSecurity token validation
US11546159B2 (en)*2021-01-262023-01-03Sap SeLong-lasting refresh tokens in self-contained format
US11757645B2 (en)2021-01-262023-09-12Sap SeSingle-use authorization codes in self-contained format
US20220377064A1 (en)*2021-05-202022-11-24Preet RajMethod and system for managing a web security protocol

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US10469484B1 (en)*2015-01-272019-11-05Google LlcAutomatic discovery and retrieval of interoperable applications
US9819672B1 (en)*2015-06-262017-11-14EMC IP Holding Company LLCSharing access tokens with trusted users
US10887301B1 (en)*2017-12-122021-01-05United Services Automobile Association (Usaa)Client registration for authorization
US11349662B2 (en)*2019-10-292022-05-31Synchrony BankPersistent login
US20210288808A1 (en)*2020-03-132021-09-16Ebay Inc.Secure token refresh
US20220232003A1 (en)*2021-01-202022-07-21International Business Machines CorporationLimiting scopes in token-based authorization systems

Cited By (18)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US12105843B2 (en)2019-10-212024-10-01Google LlcVerifiable consent for privacy protection
US11790111B2 (en)*2019-10-212023-10-17Google LlcVerifiable consent for privacy protection
US20210350021A1 (en)*2019-10-212021-11-11Google LlcVerifiable consent for privacy protection
US20230126588A1 (en)*2020-03-252023-04-27Schlumberger Technology CorporationIntegrated authentication system and method
US12113903B2 (en)2021-01-262024-10-08Sap SeLong-lasting refresh tokens in self-contained format
US20250252211A1 (en)*2021-09-032025-08-07Mastercard International IncorporatedSystems and methods for use in data coupling among data structures
US20230075552A1 (en)*2021-09-032023-03-09Mastercard International IncorporatedSystems and methods for use in data coupling among data structures
US11966492B2 (en)*2021-09-032024-04-23Mastercard International IncorporatedSystems and methods for use in data coupling among data structures
US20230109109A1 (en)*2021-09-302023-04-06Oracle International CorporationApplications as resource principals or service principals
US12316762B2 (en)*2021-09-302025-05-27Oracle International CorporationApplications as resource principals or service principals
US12069185B1 (en)*2021-10-142024-08-20Blackrock, Inc.Systems and methods for a data integration connector
CN115426156A (en)*2022-08-302022-12-02北京商银微芯科技有限公司Method and device for processing multiple concurrent asynchronous characteristic network requests
US20240291659A1 (en)*2023-02-242024-08-29Authenticating. Com, LLCTokenized Credential Verification System
CN116566600A (en)*2023-04-262023-08-08湖南快乐阳光互动娱乐传媒有限公司 Software audit status push method and device, storage medium and electronic equipment
WO2025017027A1 (en)*2023-07-192025-01-23Koninklijke Kpn N.V.Authentication and device identifier management for passive wireless transmission devices
US12210597B1 (en)*2024-05-082025-01-28Anonyome Labs, Inc.Apparatus and method for cross-domain digital verifiable credential exchange
CN119906707A (en)*2025-04-022025-04-29奥特酷智能科技(南京)有限公司 A line brushing service method and server based on SOVD protocol
CN120415911A (en)*2025-07-022025-08-01歌尔股份有限公司 Data usage rights management method, device and electronic device

Also Published As

Publication numberPublication date
US11546159B2 (en)2023-01-03
US12113903B2 (en)2024-10-08
US20230138368A1 (en)2023-05-04

Similar Documents

PublicationPublication DateTitle
US12113903B2 (en)Long-lasting refresh tokens in self-contained format
US11863677B2 (en)Security token validation
JP7545489B2 (en) Blockchain integration in enterprise environments, group permissions and access management
US11973750B2 (en)Federated identity management with decentralized computing platforms
US9875368B1 (en)Remote authorization of usage of protected data in trusted execution environments
US9130926B2 (en)Authorization messaging with integral delegation data
EP3704621A1 (en)Secure identity and profiling system
JP2013152757A (en)Intersystem single sign-on
CN105978855A (en)System and method for protecting personal information security in real-name system
US20240348592A1 (en)Apparatus and method for managing credentials
Wilusz et al.Secure protocols for smart contract based insurance services
Dhal et al.Cryptanalysis and improvement of a cloud based login and authentication protocol
US12101408B2 (en)Distribution of one-time passwords for multi-factor authentication via blockchain
KR102542840B1 (en)Method and system for providing finance authentication service based on open api
EP4544440A1 (en)Managing authorisations for local object sharing and integrity protection
CN118784313A (en) A gateway-based permission authentication method

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:SAP SE, GERMANY

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SUGAREV, RADOSLAV IVANOV;REEL/FRAME:055035/0421

Effective date:20210126

FEPPFee payment procedure

Free format text:ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STPPInformation on status: patent application and granting procedure in general

Free format text:NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

STCFInformation on status: patent grant

Free format text:PATENTED CASE


[8]ページ先頭

©2009-2025 Movatter.jp